瑞典电子政务服务源代码泄露
Source code of Swedish e-government services has been leaked

原始链接: https://darkwebinformer.com/full-source-code-of-swedens-e-government-platform-leaked-from-compromised-cgi-sverige-infrastructure/

## 瑞典电子政务平台源代码泄露 威胁行为者ByteToBreach泄露了瑞典电子政务平台的完整源代码,该代码是通过对瑞典政府数字服务关键IT提供商CGI Sverige AB的重大入侵获得的。此前,维京航线也遭受了类似的入侵。 泄露的数据不仅包括源代码,还包括员工数据库、API文档签名系统、Jenkins凭据以及用于侦察和利用的工具。敏感公民数据(个人身份信息数据库和电子签名文档)已被收集,并正在单独出售。 攻击利用了漏洞,包括完全入侵Jenkins、Docker逃逸和SSH密钥枢纽。ByteToBreach直接指责CGI的基础设施导致了此次泄露,批评将事件归咎于第三方的倾向。源代码正在被免费发布,对瑞典的数字基础设施构成严重风险。

## 瑞典电子政务数据泄露 据Hacker News报道,瑞典电子政务服务源代码已泄露并在暗网上流传。然而,泄露的内容远不止代码。更令人担忧的是,包含公民个人身份信息(PII)和电子签名文件的数据库也在单独出售。据称,加密密钥也包含在内。 初步报告显示,此次泄露可能涉及与BankID单点登录相关的系统。受影响的公司CGI声称泄露的数据来自包含测试数据的开发环境,但这一说法尚未得到证实,并且可能存在风险。 瑞典新闻媒体现在正在报道此事件,但最初的报道重点集中在源代码方面。评论员对数据收集做法和潜在的GDPR违规行为表示愤怒,并对政府内部的问责制表示怀疑。甚至有人开玩笑地询问泄露内容是否包含一款怀旧在线游戏的源代码。
相关文章

原文

Date & Time 2026-03-12 18:25:21 UTC

Threat Actor ByteToBreach

Industry Government / IT Services

Victim Organization CGI Sverige AB

Affected Platform Sweden E-Gov Platform

Category Source Code Leak

Severity Critical

Network Open Web

Price Free (Source Code)

Incident Overview

A threat actor going by ByteToBreach has leaked the entire source code of Sweden's E-Government platform, claiming it was obtained through a heavily compromised CGI Sverige AB infrastructure. CGI Sverige is the Swedish subsidiary of global IT services giant CGI Group and manages critical government digital services. This is the same actor behind the Viking Line breach posted yesterday.

The actor emphasizes this is the full E-Gov platform source code and not just configuration snippets. They state that the Swedish e-government is the most affected party, and note that citizen PII databases and electronic signing documents were also collected but are being sold separately. A staff database, API document signing system, RCE test endpoints, initial foothold details, jailbreak artifacts, and Jenkins SSH pivot credentials are all included in the listing alongside the source code.

The disclosed vulnerabilities used in the attack include a full Jenkins compromise, Docker escape via the Jenkins user being in the Docker group, SSH private key pivots, analysis of local .hprof files for reconnaissance, and SQL copy-to-program pivots. The actor makes a pointed note about companies blaming breaches on third parties, explicitly stating that this compromise belongs clearly to CGI infrastructure, referencing Viking Line and Slavia Pojistovna as other examples. The source code is being released for free with multiple backup download links, while citizen databases are sold separately.

Compromised Data Categories

Full E-Gov Platform Source Code Staff Database API Document Signing Systems Jenkins SSH Pivot Credentials RCE Test Endpoints Initial Foothold & Jailbreak Artifacts Citizen PII Databases (Sold Separately) Electronic Signing Documents (Sold Separately)

Claim URL - For Subscribers Only

The claim URL for this listing can be found on the Threat Feed or Ransomware Feed for subscribers.

联系我们 contact @ memedata.com